37 research outputs found

    Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

    Get PDF
    We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product. Wieschebrink treated the genus zero case a few years ago but his approach cannot be extent straightforwardly to other genera. We address this problem by introducing and using a new notion, which we call the t-closure of a code

    An upper bound of Singleton type for componentwise products of linear codes

    Full text link
    We give an upper bound that relates the minimum weight of a nonzero componentwise product of codewords from some given number of linear codes, with the dimensions of these codes. Its shape is a direct generalization of the classical Singleton bound.Comment: 9 pages; major improvements in v3: now works for an arbitrary number of codes, and the low-weight codeword can be taken in product form; submitted to IEEE Trans. Inform. Theor

    Matem脿tiques que milloren la comunicaci贸

    Get PDF
    El soroll indesitjat en la comunicaci贸 digital distorsiona el missatge a transmetre, per la qual cosa els investigadors estudien com dissenyar bons codis de canal, una eina matem脿tica que permet detectar i corregir els errors que es produeixen en la transmissi贸 d'informaci贸. Investigadors de la UAB han aconseguit definir nous codis de canal que permeten d'obtenir millors par脿metres de qualitat.El ruido indeseado en la comunicaci贸n digital distorsiona el mensaje que se transmite, por lo que los investigadores estudian c贸mo dise帽ar buenos c贸digos de canal, una herramienta matem谩tica que permite detectar y corregir los errores que se producen en la transmisi贸n de informaci贸n. Investigadores de la UAB han conseguido definir nuevos c贸digos de canal que permiten obtener mejores par谩metros de calidad

    Fast Erasure-and-Error Decoding and Systematic Encoding of a Class of Affine Variety Codes

    Full text link
    In this paper, a lemma in algebraic coding theory is established, which is frequently appeared in the encoding and decoding for algebraic codes such as Reed-Solomon codes and algebraic geometry codes. This lemma states that two vector spaces, one corresponds to information symbols and the other is indexed by the support of Grobner basis, are canonically isomorphic, and moreover, the isomorphism is given by the extension through linear feedback shift registers from Grobner basis and discrete Fourier transforms. Next, the lemma is applied to fast unified system of encoding and decoding erasures and errors in a certain class of affine variety codes.Comment: 6 pages, 2 columns, presented at The 34th Symposium on Information Theory and Its Applications (SITA2011

    A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes

    Get PDF
    Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting codes. The underlying public code is a modified Reed-Solomon code obtained from inserting a zero submatrix in the Vandermonde generating matrix defining it. The columns that define this submatrix are kept secret and form a set LL. We give here a distinguisher that detects if one or several columns belong to LL or not. This distinguisher is obtained by considering the code generated by component-wise products of codewords of the public code (the so called "square code"). This operation is applied to punctured versions of this square code obtained by picking a subset II of the whole set of columns. It turns out that the dimension of the punctured square code is directly related to the cardinality of the intersection of II with LL. This allows an attack which recovers the full set LL and which can then decrypt any ciphertext.Comment: 11 page
    corecore